Intersections Data Breach. July

Size: px
Start display at page:

Download "Intersections Data Breach. July"

Transcription

1 Intersections Data Breach Consumer Notification Guide July

2

3 Table of contents Section I Introduction Section II State and Territory Regulations Alaska Arizona 7 Arkansas California Colorado Connecticut Delaware District of Columbia Florida Georgia 25 Hawaii Idaho Illinois Indiana 33 Iowa 35 Kansas Louisiana Maine Maryland Massachusetts Michigan Minnesota Mississippi Missouri Montana Nebraska Nevada 59 New Hampshire 61 New Jersey New York North Carolina North Dakota 71 Ohio 73 Oklahoma Oregon 77 Pennsylvania 79 Puerto Rico Rhode Island 83 South Carolina Tennessee 87 Texas Utah 91 Vermont Virgin Islands 95 Virginia 97 Washington West Virginia 101 Wisconsin 103 Wyoming Section III Federal Rules and Guidelines Office of Management and Budget (OMB) Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice FTC Health Breach Notification Rule HHS Breach Notification for Unsecured Health Information 113 Section IV Additional Law Enforcement Contacts National Alabama Kentucky New Mexico South Dakota 116 American Samoa Guam Northern Mariana Islands Section V About Intersections DataBreachServices@Intersections.com 3

4 introduction STATE One of the leading topics discussed in 2009 and continuing in 2010, by both state and federal lawmakers, is privacy protection, including data breach notification. Over the past five years 46 states, the District of Columbia, Puerto Rico and the Virgin Islands all have passed data breach notification regulations. The number of laws will continue to grow in the coming year and there continues to be much discussion regarding federal regulation as well. These requirements are designed to dictate who companies notify and the means in which they notify consumers in the event of a data breach. With so many state laws to consider though, companies who do business across the country can easily be confused and find themselves with difficulties especially considering the pressure they are under to get notices out to consumers quickly. A large data breach impacting consumers across multiple jurisdictions often can require a company to understand and comply with many, if not all laws which frequently conflict and contain subtle and not so subtle differences. The purpose of this Intersections Data Breach Consumer Notification Guide is to help companies better understand what states have data breach notification laws and what those laws require. Armed with this knowledge, companies can better plan for and react to the unfortunate event of a data breach. To find out the best ways to achieve a state of data breach readiness, please refer to the Intersections Seven Steps to Data Breach Readiness Guide. Intersections Inc. has been a leader in the fight against identity theft for over a decade. We have protected the identities of more than 30 million consumers and helped tens of thousands of individuals recover after a verified case of identity theft. We understand the harm that a corporate breach event can cause for companies and their customers, and we offer a full line of breach response products and services to provide both peace of mind and a compelling brand experience. The information, data and other content in this summary should not be considered as legal advice. It is provided to You as is and with no warranty whatsoever. Specifically, intersections inc. ( Intersections ) makes no warranty Regarding the accuracy or reliability of any information, data or other content provided in this summary and Under no circumstances will intersections be liable for any loss or damage caused by your reliance on the Information, data or other content contained in this summary. It is your responsibility to evaluate the accuracy, completeness and usefulness of any information, data or other Content provided in this summary. Please seek the advice of a legal professional, as appropriate, regarding the Evaluation of any specific information, data or other content provided in this summary DataBreachServices@Intersections.com

5 SUmmary of Law - EFFECTIVE DATE - 7/1/09 ALASKA What is a breach: Unauthorized acquisition, or reasonable belief of unauthorized acquisition, of personal information, including acquisition by: photocopying; facsimile; other paper-based method; a device, including a computer that can read, write, or store information that is represented in numerical form; and other methods not identified. When is notice required: Computerized data containing personal information: unencrypted. Personal information: First name or first initial and last name in combination with (1) Social Security number; (2) drivers license or state identification number; (3) account, credit or debit card number; (4) personal code to access an account including a security code, access code, personal identification number or password; or (5) passwords, personal identification numbers, or other access codes for financial accounts in combination with any required security code, access code, or password that would permit access to an individual financial account. Who has to notify: An information collector that owns or licenses personal information in any form. An information recipient that maintains personal information must notify and cooperate with the information distributor that owns or licenses the personal information. Who has to be notified: The individual. The nationwide credit reporting agencies must be notified if more than 1,000 individuals receive notice at one time. Regulatory/law enforcement notice not specifically addressed. Required contents of notice: Not specifically addressed. Timing of notice: The most expedient manner possible and without unreasonable delay. Notification may be delayed if a law enforcement agency determines that it will impede a criminal investigation. Notification is required after the law enforcement agency determines that it will no longer interfere with the investigation. Notification may be delayed to determine the scope of the breach and restore the reasonable integrity of the system. Permitted delivery of notice: Written. Electronic, if the person s primary method of communication is electronic or if electronic notice is consistent with E-Sign requirements. Substitute notice may be done if cost of providing notice exceeds $150,000 or number of persons exceeds 300,000 or sufficient contact information not available. All of the following must be done: (i) ; (ii) web site posting; and (iii) notice to major statewide media DataBreachServices@Intersections.com 5

6 Alaska (continued) WHEN IS NOTICE NOT REQUIRED Harm trigger: Notice is not required if, after investigation and written notice to the Attorney General, there is no reasonable likelihood that harm has resulted or will result. The determination must be documented in writing for five years. Statutory: Credit reporting agency notice provision does not apply if the information collector is subject to the Gramm-Leach-Bliley Act (GLB). Good Faith: Notice is not required if there has been a good faith acquisition of personal information by an employee or agent of an information collector for a legitimate purpose if the employee or agent does not use the personal information for a purpose unrelated to a legitimate purpose or make further unauthorized disclosure. Encryption: Notice is not required if the personal information was encrypted or redacted and the encryption key has not been accessed or acquired. STATUTE CITATION Alaska Stat through basis/get_bill_text. asp?hsid=hb0065z&session=25 ATTORNEY GENERAL Daniel S. Sullivan, Esquire Attorney General of Alaska 123 Fourth Street Diamond Courthouse Juneau, AK FBI Anchorage 101 East Sixth Avenue Anchorage, Alaska Secret Service Anchorage DataBreachServices@Intersections.com

7 SUmmary of Law - EFFECTIVE DATE - 12/31/06 ARIZONA What is a breach: Unauthorized acquisition and access to unencrypted or unredacted computerized data. When is notice required: Computerized data containing personal information: unencrypted or unredacted. Personal information: First name or first initial and last name in combination with (1) Social Security number; (2) drivers license or identification card number; or (3) financial account number, credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual financial account. Who has to notify: A person that owns or licenses computerized data. A person that maintains computerized data must notify and cooperate with the owner or licensee. Who has to be notified: The individual. Regulatory/law enforcement notice not specifically addressed. Required contents of notice: Not specifically addressed. Timing of notice: The most expedient manner possible and without unreasonable delay. Notification may be delayed if law enforcement agency advises that it will impede a criminal investigation. Notification is required after the law enforcement agency determines that it will not compromise the investigation. Notification may be delayed to determine the nature and scope of the breach, to identify individuals affected, or to restore the reasonable integrity of the system. Permitted delivery of notice: Written. Electronic, if the person s primary method of communication is electronic or if electronic notice is consistent with E-Sign requirements. Telephonic. Substitute notice may be done if cost of providing notice exceeds $50,000 or number of persons exceeds 100,000 or sufficient contact information not available. All of the following must be done: (i) ; (ii) web site posting; and (iii) notice to major statewide media DataBreachServices@Intersections.com 7

8 ARIZONA (continued) WHEN IS NOTICE NOT REQUIRED Harm trigger: Notice is not required if the acquisition is not reasonably likely to cause substantial economic loss. Notice is not required if, after a reasonable investigation, there is a determination that a breach of the security of the system has not occurred or is not reasonably likely to occur. Statutory: Exemptions from certain requirements for entities subject to the Gramm-Leach-Bliley Act (GLB) Title V and for Health Insurance Portability and Accountability Act (HIPAA) covered entities. Entities are deemed to be in compliance with some or all of the state statute s requirements if they are in compliance with rules, regulations, procedures, guidance or guidelines established by the primary or functional federal regulator. Existing Policy: Certain notice requirements may be satisfied if a person maintains its own notification procedures; and if the person notifies the affected individuals in accordance with its policies. Good Faith: Notice is not required if there has been a good faith acquisition by an employee or agent of the person if the personal information is not used for an unrelated purpose or subject to further willful unauthorized disclosure. Public Records: Notice is not required if the information consists of publicly available information that is lawfully made available to the general public from federal, state or local government records or widely distributed media. Encryption: Notice is not required if the personal information was encrypted or redacted. STATUTE CITATION Ariz. Rev. Stat. Ann (h) legtext/47leg/2r/bills/sb1338s. htm?printformat=yes ATTORNEY GENERAL Terry Goddard, Esquire Attorney General of Arizona 1275 W. Washington Street Phoenix, AZ FBI Phoenix 201 East Indianola Avenue Suite 400 Phoenix, Arizona Secret Service Phoenix Tucson DataBreachServices@Intersections.com

9 SUmmary of Law - EFFECTIVE DATE - 8/12/05 Arkansas What is a breach: Unencrypted or unredacted personal information that was, or is reasonably believed to have been, acquired by an unauthorized person. When is notice required: Computerized data containing personal information: unencrypted or unredacted. Personal information: First name or first initial and last name in combination with (1) Social Security number; (2) drivers license or identification card number; or (3) financial account number, credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual financial account; and (4) medical information (any individually identifiable information regarding the individual s medical history or medical treatment or diagnosis by a health care professional). Who has to notify: A person that owns or licenses computerized data. A person that maintains computerized data must notify the owner or licensee. Who has to be notified: The individual. Regulatory/law enforcement notice not specifically addressed. Required contents of notice: Not specifically addressed. Timing of notice: The most expedient time and manner possible and without unreasonable delay. Notification may be delayed for legitimate needs of law enforcement if notification would impede a criminal investigation. Notification is required after the law enforcement agency determines that it will not compromise the investigation. Notification may be delayed to determine the scope of the breach and restore the reasonable integrity of the system. Permitted delivery of notice: Written. Electronic, if electronic notice is consistent with E-Sign requirements. Substitute notice may be done if cost of providing notice exceeds $250,000 or number of persons exceeds 500,000 or sufficient contact information not available. All of the following must be done: (i) ; (ii) web site posting; and (iii) notice to major statewide media DataBreachServices@Intersections.com 9

10 Arkansas (continued) WHEN IS NOTICE NOT REQUIRED Harm trigger: Notice is not required if, after investigation, a business determines that there is no reasonable likelihood of harm. Statutory: Entities are deemed to be in compliance with some or all of the state statute s requirements if they are in compliance with or regulated by state or federal law that provides greater protection and at least as thorough disclosure requirements. Existing Policy: Certain notice requirements may be satisfied if a person or business maintains its own notification procedures consistent with the timing requirements of state law; and if the person or business notifies affected individuals in accordance with its policies. Good Faith: Notice is not required if there has been a good faith acquisition of personal information by an employee or agent of the person or business if the personal information is not otherwise used or subject to further unauthorized disclosure. Encryption: Notice is not required if the personal information was encrypted. STATUTE CITATION Ark. Code (2006) ar.us/searchcenter/pages/ ArkansasCodeSearchResultPage.aspx ftp:// acts/2005/public/act1526.pdf ATTORNEY GENERAL Dustin McDaniel, Esquire Attorney General of Arkansas 200 Tower Building 323 Center Street Little Rock, AR FBI Little Rock 24 Shackleford West Boulevard Little Rock, Arkansas Secret Service Little Rock DataBreachServices@Intersections.com

11 SUmmary of Law - EFFECTIVE DATE - 7/1/03, AMENDED 1/1/10 Section : California What is a breach: Unencrypted or unredacted computerized personal information that was, or is reasonably believed to have been, acquired by an unauthorized person. When is notice required: Computerized data containing personal information: unencrypted or unredacted. Personal information: First name or first initial and last name in combination with (1) Social Security number; (2) drivers license or identification card number; (3) account number, credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual financial account; (4) medical information; or (5) health information. For purposes of this section, medical information means any information regarding an individual s medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional. Who has to notify: A person that owns or licenses computerized data. A person that maintains computerized data must notify the owner or licensee. A state guidance document distinguishes between data owners and data custodians, providing that data owners should require custodians to notify owners upon detection of an incident. See Who has to be notified: The individual. Regulatory/law enforcement notice not specifically addressed. State guidance document recommends notifying law enforcement and consumer reporting agencies. See secbreach.pdf. Required contents of notice: Not specifically addressed. Timing of notice: The most expedient time possible and without unreasonable delay. Notification may be delayed to determine the scope of the breach and restore the reasonable integrity of the system. Notification may be delayed for legitimate needs of law enforcement if notification would impede a criminal investigation. State guidance document recommends notifying individuals within 10 business days. See DataBreachServices@Intersections.com 11

12 California (continued) Permitted delivery of notice: Written. Electronic, if electronic notice is consistent with E-Sign requirements. Substitute notice may be done if cost of providing notice exceeds $250,000 or number of persons exceeds 500,000 or sufficient contact information not available. All of the following must be done: (i) (when available); (ii) web site posting; and (iii) notice to major statewide media. Section (State Agencies): Any agency that owns or licenses computerized data that includes personal information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. Section (Clinics, Health Facilities, Home Health Agencies, and Hospices): No later than 5 business days after the unlawful or unauthorized access, use, or disclosure of a patient s medical information has been detected, a clinic, health facility, home health agency, or hospice shall report to: The State Department of Public Health; and The affected patient or the patient s representative at the last known address. Unauthorized means the inappropriate access, review, or viewing of patient medical information without a direct need for medical diagnosis, treatment, or other lawful use as permitted by the Confidentiality of Medical Information Act (Part 2.6 (commencing with Section 56) of Division 1 of the Civil Code) or any other statute or regulation governing the lawful access, use, or disclosure of medical information. Medical information means any individually identifiable information, in electronic or physical form, in possession of or derived from a provider of health care, health care service plan, pharmaceutical company, or contractor regarding a patient s medical history, mental or physical condition, or treatment. Individually identifiable means that the medical information includes or contains any element of personal identifying information sufficient to allow identification of the individual, such as the patient s name, address, electronic mail address, telephone number, or social security number, or other information that, alone or in combination with other publicly available information, reveals the individual s identity. A clinic, health facility, home health agency, or hospice shall delay the reporting of any unlawful or unauthorized access to, or use or disclosure of, a patient s medical information beyond 5 business days if a law enforcement agency or official provides the clinic, health facility, home health agency, or hospice with a written or oral statement that compliance with the reporting requirements would be likely to impede the law enforcement agency s activities and specifies a date upon which the delay shall end, not to exceed 60 days after a written request is made, or 30 days after an oral request is made DataBreachServices@Intersections.com

13 (continued) California A law enforcement agency or official may request an extension of a delay based upon a written declaration (1) that there exists a bona fide, ongoing, significant criminal investigation of serious wrongdoing, (2) that notification of patients will undermine the law enforcement agency s activities, and (3) that specifies a date upon which the delay shall end, not to exceed 60 days after the end of the original delay period. If the statement of the law enforcement agency or official is made orally, then the clinic, health facility, home health agency, or hospice shall do the following: (A) Document the oral statement, including, but not limited to, the identity of the law enforcement agency or official making the oral statement and the date upon which the oral statement was made; (B) Limit the delay in reporting the unlawful or unauthorized access to, or use or disclosure of, the patient s medical information to the date specified in the oral statement, not to exceed 30 calendar days from the date that the oral statement is made, unless a written statement is received during that time. A clinic, health facility, home health agency, or hospice shall submit a report that is delayed pursuant to this subdivision not later than five business days after the date designated as the end of the delay DataBreachServices@Intersections.com 13

14 California (continued) WHEN IS NOTICE NOT REQUIRED Existing Policy: Certain notice requirements may be satisfied if a person or business maintains its own notification procedures consistent with the timing requirements of state law; and if the person or business notifies affected individuals in accordance with its policies. Good Faith: Notice is not required if there has been a good faith acquisition of personal information by an employee or agent of a person or business if the personal information is not otherwise used or subject to further unauthorized disclosure. Public Records: Notice is not required if the information consists of records of publicly available information that is lawfully made available to the general public from federal, state, or local government records. Encryption: Notice is not required if the personal information was encrypted. STATUTE CITATION Cal. Civ. Code title code/code.html?sec=civ&codesecti on= Cal. Civ. Code title code/code.html?sec=civ&codesecti on= Cal. Health and Safety Code bill_ _chaptered.pdf ATTORNEY GENERAL Edmund G. Brown, Jr., Esquire Attorney General of California 1300 I Street, Suite 1740 Sacramento, CA FBI Los Angeles Wilshire Blvd. Suite 1700, FOB Los Angeles, California San Diego Federal Office Building 9797 Aero Drive San Diego, California Sacramento 4500 Orange Grove Avenue Sacramento, California (916) San Francisco 450 Golden Gate Avenue, 13th. Floor San Francisco, California Secret Service Fresno Riverside Sacramento San Diego San Jose Santa Ana Ventura Electronic Crimes Task Force Los Angeles laxectf@einformation.usss.gov Electronic Crimes Task Force San Francisco sfoectf@einformation.usss.gov DataBreachServices@Intersections.com

15 SUmmary of Law - EFFECTIVE DATE - 7/1/06 colorado What is a breach: Unauthorized acquisition of unencrypted computerized data that compromises the security, confidentiality, or integrity of personal information that was, or is reasonably believed to have been acquired by an unauthorized person. When is notice required: Computerized data containing personal information: unencrypted, un-redacted. Personal information: First name or first initial and last name in combination with (1) Social Security number; (2) drivers license or identification card number; or (3) account number, credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual financial account. Who has to notify: A person that owns or licenses computerized data. A person that maintains computerized data must notify and cooperate with the owner or licensee. Who has to be notified: The individual. The nationwide credit reporting agencies must be notified if more than 1,000 individuals receive notice at one time. Regulatory/law enforcement notice not specifically addressed. Required contents of notice: Not specifically addressed. Timing of notice: The most expedient time possible and without unreasonable delay and as soon as possible after a prompt investigation into the likelihood that a security breach will lead to the misuse of personal information. Notification may be delayed for legitimate needs of law enforcement if notification would impede a criminal investigation. Law enforcement must make a request to delay notification. Notification is required in good faith, without unreasonable delay, and as soon as possible after the law enforcement agency determines that it will not compromise the investigation. Notification may be delayed to determine the scope of the breach and restore the reasonable integrity of the system. Permitted delivery of notice: Written. Electronic, if the person s primary method of communication is electronic or if electronic notice is consistent with E-Sign requirements. Telephonic. Substitute notice may be done if cost of providing notice exceeds $250,000 or number of persons exceeds 250,000 or sufficient contact information not available. All of the following must be done: (i) ; (ii) web site posting; and (iii) notice to major statewide media DataBreachServices@Intersections.com 15

16 COlorado (continued) WHEN IS NOTICE NOT REQUIRED Harm trigger: Notice is not required if an investigation determines that misuse of information has not occurred and is not reasonably likely to occur. Statutory: Entities are deemed to be in compliance with some or all of the state statute s requirements if they are regulated by state or federal law and procedures are maintained pursuant to laws, rules, regulations, or guidelines established by the primary or functional state or federal regulator. Existing Policy: Certain notice requirements may be satisfied if a person or a commercial entity maintains its own notification procedures consistent with the timing requirements of state law; and if the person or the commercial entity notifies affected individuals in accordance with its policies. Good Faith: Notice is not required if there has been a good faith acquisition of personal information by an employee or agent of the individual or commercial entity for the purposes of the individual or commercial entity if the personal information is not used for or is not subject to further unauthorized disclosure. Public Records: Notice is not required if the information consists of records of publicly available information that is lawfully made available to the general public from federal, state, or local government records or widely distributed media. Encryption: Notice is not required if the personal information was encrypted. STATUTE CITATION Colo. Revised Statutes lpext.dll?f=templates&fn=main-h. htm&cp= ATTORNEY GENERAL John Suthers, Esquire Attorney General Colorado 1525 Sherman Street Denver, CO FBI Denver 8000 East 36th Avenue Denver, Colorado Secret Service Denver DataBreachServices@Intersections.com

17 SUmmary of Law - EFFECTIVE DATE - 1/1/06 Connecticut What is a breach: Unauthorized access to or acquisition of personal information that was, or is reasonably believed to have been, accessed by an unauthorized person. When is notice required: Electronic files, media databases or computerized data containing personal information: unencrypted or unsecured by other means that renders personal information unusable or unreadable. Personal information: First name or first initial and last name in combination with (1) Social Security number; (2) drivers license or identification card number; or (3) account number, credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual financial account. Who has to notify: A person that owns or licenses electronic data. A person that maintains computerized data must notify the owner or licensee. Who has to be notified: The individual. Regulatory/law enforcement notice not specifically addressed. Required contents of notice: Not specifically addressed. Timing of notice: Without unreasonable delay. Notification may be delayed for law enforcement if notification would impede a criminal investigation. Law enforcement must make a request to delay notification. Notification is required after the law enforcement agency determines it will not compromise the investigation and so notifies the person to send the notification. Notification may be delayed to determine the nature and scope of the breach, identify individuals affected, or to restore the reasonable integrity of the system. Permitted delivery of notice: Written. Electronic, if the person s primary method of communication is electronic or if electronic notice is consistent with E-Sign requirements. Telephonic. Substitute notice may be done if cost of providing notice exceeds $250,000 or number of persons exceeds 500,000 or sufficient contact information not available. All of the following must be done: (i) (when available); (ii) web site posting; and (iii) notice to major statewide media DataBreachServices@Intersections.com 17

18 Connecticut (continued) WHEN IS NOTICE NOT REQUIRED Harm trigger (with limitation): Notification not required if, after an appropriate investigation and consultation with relevant federal, state, and local agencies responsible for law enforcement, the person reasonably determines that harm will not likely result. Existing Policy: Certain notice requirements may be satisfied if an individual or commercial entity maintains its own security breach procedures consistent with the timing requirements of state law; and notifies affected individuals in accordance with its policies. Good Faith: Notice is not required if there has been a good faith acquisition of personal information by an employee or agent of the individual or commercial entity for the purposes of the individual or commercial entity if the personal information is not used for or is not subject to further unauthorized disclosure. Public Records: Notice is not required if the information consists of records of publicly available information that is lawfully made available to the general public from federal, state, or local government records or widely distributed media. Encryption: Notice is not required if the personal information was encrypted. STATUTE CITATION Conn. Statutes 36a b pub_statutes.html ATTORNEY GENERAL Richard Blumenthal, Esquire Attorney General of Connecticut 55 Elm Street Hartford, CT FBI New Haven 600 State Street New Haven, Connecticut Secret Service New Haven DataBreachServices@Intersections.com

19 SUmmary of Law - EFFECTIVE DATE - 6/28/05 delaware What is a breach: Unauthorized acquisition of unencrypted computerized data that compromises the security, confidentiality, or integrity of personal information that was, or is reasonably believed to have been, accessed by an unauthorized person. When is notice required: Computerized data containing personal information: unencrypted. Personal information: First name or first initial and last name in combination with (1) Social Security number; (2) drivers license or identification card number; or (3) account number, credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual financial account; (4) Individually identifiable information, in electronic or physical form, regarding the Delaware resident s medical history, medical treatment or diagnosis by a health care professional. Who has to notify: A person that owns or licenses computerized data. A person that maintains computerized data must notify and cooperate with the owner or licensee. Who has to be notified: The individual. Regulatory/law enforcement notice not specifically addressed. Required contents of notice: Not specifically addressed. Timing of notice: The most expedient time possible and without unreasonable delay. Notification may be delayed for legitimate needs of law enforcement if notification would impede a criminal investigation. Notification is required in good faith without unreasonable delay and as soon as possible after the law enforcement agency determines it will not compromise the investigation. Notification may be delayed to determine the scope of the breach and restore the reasonable integrity of the system. Permitted delivery of notice: Written. Electronic, if the person s primary method of communication is electronic or if electronic notice is consistent with E-Sign requirements. Telephonic. Substitute notice may be done if cost of providing notice exceeds $75,000 or number of persons exceeds 100,000 or sufficient contact information not available. All of the following must be done: (i) ; (ii) web site posting; and (iii) notice to major statewide media DataBreachServices@Intersections.com 19

20 Delaware (continued) WHEN IS NOTICE NOT REQUIRED Harm trigger: Notice is not required if, after a reasonable and prompt investigation is conducted, it is determined that the misuse of information has not and is not reasonably likely to occur. Statutory: Entities are deemed to be in compliance with some or all of the state statute s requirements if they are regulated by State or federal law and procedures are maintained pursuant to laws, rules, regulations, or guidelines established by the primary or functional State or federal regulator and notice is provided in accordance with these procedures if a breach occurs. Existing Policy: Certain notice requirements may be satisfied if an individual or a commercial entity maintains its own notice procedures consistent with the timing requirements of state law; and if the individual or the commercial entity notifies affected individuals in accordance with its policies. Good Faith: Notice is not required if there has been a good faith acquisition of personal information by an employee or agent of the individual or commercial entity for the purposes of the individual or commercial entity if the personal information is not used or subject to further unauthorized disclosure. Public Records: Notice is not required if the information consists of records of publicly available information that is lawfully made available to the general public from federal, state, or local government records. Encryption: Notice is not required if the personal information was encrypted. STATUTE CITATION Del. Code 6 12B-102 (2006) vwlegislation/hb+116/$file/legis.html?open ATTORNEY GENERAL Joseph R. Biden, III, Esquire Attorney General of Delaware Carvel State Office Building 820 N. French Street Wilmington, DE Secret Service Wilmington DataBreachServices@Intersections.com

21 SUmmary of Law - EFFECTIVE DATE - 7/1/07 District of Columbia What is a breach: Unauthorized acquisition of computerized or other electronic data, or any equipment or device storing such data that compromises the security, confidentiality, or integrity of personal information maintained by the person or business. When is notice required: Electronic or computerized data containing personal information or equipment storing such data that has not been rendered secure so as to be unusable by an unauthorized third party. Personal information: (I) First name or first initial and last name in combination with (1) Social Security number; (2) drivers license or identification card number; or (3) credit card number or debit card number; OR (II) any other number or code or combination, such as account number, security code, access code, or password, that allows access to an individual s financial or credit account. Who has to notify: A person that owns or licenses electronic or computerized data. A person that maintains computerized data must notify the owner or licensee. Who has to be notified: The individual. The nationwide credit reporting agencies must be notified if more than 1,000 individuals receive notice at one time. Regulatory/law enforcement notice not specifically addressed. Required contents of notice: Not specifically addressed. Timing of notice: The most expedient time possible and without unreasonable delay. Notification may be delayed for law enforcement if notification would impede a criminal investigation. Notification is required as soon as possible after the law enforcement agency determines it will not compromise the investigation. Notification may be delayed to determine the scope of the breach and restore the reasonable integrity of the system. Permitted delivery of notice: Written. Electronic, if the consumer consents or if electronic notice is consistent with E-Sign requirements. Substitute notice may be done if cost of providing notice exceeds $50,000 or number of persons exceeds 100,000 or sufficient contact information not available. All of the following must be done: (i) ; (ii) web site posting; and (iii) notice to major local, and if applicable, national media DataBreachServices@Intersections.com 21

22 DISTRICT OF COLumbia (continued) WHEN IS NOTICE NOT REQUIRED Statutory: Notice is not required to credit reporting agencies under the statute if the entity is subject to the Gramm-Leach-Bliley Act (GLB). Existing Policy: Certain notice requirements may be satisfied if a person or business maintains its own notification procedures consistent with the timing requirements of state law; and if the person or business provides notice, in accordance with its policies, reasonably calculated to give actual notice to affected individuals. Good Faith: Notice is not required if there has been a good faith acquisition of personal information by an employee or agent of the person or business for the purposes of the person or business if the personal information is not used improperly or subject to further unauthorized disclosure. Public Records: Notice is not required if the information consists of publicly available information that is lawfully made available to the general public from federal, state, or local government records. Encryption: Notice is not required if the data has been rendered secure, so as to be unusable by an unauthorized third party. STATUTE CITATION D.C. Code through 53 linkedslice/default.asp?sp=dcc-1000 ATTORNEY GENERAL Peter Nickles, Esquire Attorney General of the District of Columbia John A. Wilson Building 1350 PA Avenue, NW, Suite 409 Washington, DC FBI Washington Washington Metropolitan Field Office 601 4th Street, N.W. Washington, D.C Secret Service Electronic Crimes Task Force Washington DC wfoectf@einformation.usss.gov DataBreachServices@Intersections.com

23 SUmmary of Law - EFFECTIVE DATE - 7/1/05 florida What is a breach: Unlawful and unauthorized acquisition of unencrypted data that compromises the security, confidentiality, or integrity of personal information that was, or is reasonably believed to have been, accessed by an unauthorized person. When is notice required: Computerized data containing personal information: unencrypted. Personal information: First name or first initial and last name or any middle name and last name in combination with (1) Social Security number; (2) drivers license or identification card number; or (3) account number, credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual financial account. Who has to notify: A person with a direct business relationship with the resident or pursuant to an agreement. A person that maintains computerized data must notify the owner or licensee within 10 business days. Who has to be notified: The individual. The business entity on whose behalf data is maintained. The nationwide credit reporting agencies must be notified if more than 1,000 individuals receive notice in a single occurrence. Regulatory/law enforcement notice not specifically addressed. Required contents of notice: Not specifically addressed. Timing of notice: Without unreasonable delay, but no later than 45 days following determination of the breach or notice from law enforcement. Notification may be delayed for legitimate needs of law enforcement if notification would impede a criminal investigation. Notification is required after the law enforcement agency determines it will not compromise the investigation. Notification may be delayed to determine the presence, nature and scope of the breach and restore the reasonable integrity of the system. Permitted delivery of notice: Written. Electronic, if consumer consent and consistent with E-Sign OR if the person or business providing the notice has a valid address for the subject person and the subject person has agreed to accept communications electronically. Substitute notice may be done if cost of providing notice exceeds $250,000 or number of persons exceeds 500,000 or sufficient contact information not available. All of the following must be done: (i) ; (ii) web site posting; and (iii) notice to major statewide media DataBreachServices@Intersections.com 23

24 FLORIDA (continued) WHEN IS NOTICE NOT REQUIRED Harm trigger: Notice is not required if, after an appropriate investigation or after consultation with relevant law enforcement, it is determined that the breach has not and will not likely result in harm. The determination must be documented in writing for five years. Statutory: Entities are deemed to be in compliance with some or all of the state statute s requirements if they are subject to rules, regulations, procedures or guidelines established by their federal functional regulator, if notice is made in accordance with those requirements in the event of a breach. Existing Policy: Certain notice requirements may be satisfied if a person or business maintains its own notification procedures consistent with the timing requirements of state law; and if the person or business provides notice, in accordance with its policies, reasonably calculated to give actual notice to affected individuals. Good Faith: Notice is not required if there has been a good faith acquisition of personal information by an employee or agent of the person or business for the purposes of the person or business if the personal information is not used improperly or subject to further unauthorized disclosure. Public Records: Notice is not required if the information consists of publicly available information that is lawfully made available to the general public from federal, state, or local government records. Encryption: Notice is not required if the data has been rendered secure, so as to be unusable by an unauthorized third party. STATUTE CITATION Fla. Statutes Ann. title index.cfm?app_mode=display_ Statute&URL=Ch0817/ch0817.htm ATTORNEY GENERAL Bill McCollum, Esquire Attorney General of Florida The Capitol 107 W. Gaines Street Tallahassee, FL FBI North Miami Beach Northwest Second Avenue North Miami Beach, Florida Jacksonville 6061 Gate Parkway Jacksonville, Florida Tampa 5525 West Gray Street Tampa, Florida Secret Service Fort Myers Jacksonville Tallahassee Tampa West Palm Beach Electronic Crimes Task Force Miami miaectf@einformation.usss.gov Electronic Crimes Task Force Orlando orlecwg@einformation.usss.gov DataBreachServices@Intersections.com

25 S U m m a ry o f L aw - E F F EC T I V E DAT E - 5/5/05 Georgia What is a breach: Unauthorized acquisition of unencrypted data that compromises the security, confidentiality, or integrity of personal information that was, or is reasonably believed to have been, accessed by an unauthorized person. When is notice required: Electronic or computerized data containing personal information: unencrypted or unredacted. Personal information: First name or first initial or middle name and last name in combination with (1) Social Security number; (2) drivers license or identification card number; (3) account number, credit card number or debit card number if such a number could be used without additional identifying information, access codes, or passwords; (4) account passwords or personal identification numbers or other access codes; or (5) any of the items listed in 1-4 when not in connection with the individual s first name or first initial and last name if the information compromised would be sufficient to perform or attempt to perform identity theft against the person whose information was compromised. Who has to notify: An information broker. A person that maintains computerized data on behalf of an information broker must notify the information broker within 24 hours following discovery of the breach. Who has to be notified: The individual. The information broker on whose behalf the data is maintained. The nationwide credit reporting agencies must be notified if more than 10,000 individuals receive notice at one time. Regulatory/law enforcement notice not specifically addressed. Required contents of notice: Not specifically addressed. Timing of notice: The most expedient time possible and without unreasonable delay. Notification may be delayed for legitimate needs of law enforcement if notification would compromise a criminal investigation. Notification is required after the law enforcement agency determines it will not compromise the investigation. Notification may be delayed to determine the scope of the breach and restore the reasonable integrity, security and confidentiality of the system. Permitted delivery of notice: Written. Telephonic. Electronic, if electronic notice is consistent with E-Sign requirements. Substitute notice may be done if cost of providing notice exceeds $50,000 or number of persons exceeds 100,000 or sufficient contact information not available. All of the following must be done: (i) ; (ii) web site posting; and (iii) notice to major statewide media DataBreachServices@Intersections.com 25

26 GEORGIA (continued) WHEN IS NOTICE NOT REQUIRED Existing Policy: Certain notice requirements may be satisfied if an information broker or data collector maintains its own notification procedures consistent with the timing requirements of state law; and if it notifies affected individuals in accordance with its policies. Good Faith: Notice is not required if there has been a good faith acquisition or use of personal information by an employee or agent of an information broker or data collector for the purposes of such information broker or data collector provided that the personal information is not used or subject to further unauthorized disclosure. Public Records: Notice is not required if the information consists of publicly available information that is lawfully made available to the general public from federal, state, or local government records. Encryption: Notice is not required if the data has been encrypted so as to be unusable by an unauthorized third party, and has not, or is not reasonably believed to have been, acquired by an unauthorized person. STATUTE CITATION Ga. Code (2006) legis/2005_06/fulltext/sb230.htm ATTORNEY GENERAL Thurbert E. Baker, Esquire Attorney General Georgia 40 Capitol Square, SW Atlanta, GA FBI Atlanta 2635 Century Parkway, Northeast Suite 400 Atlanta, Georgia Secret Service Albany Savannah Electronic Crimes Task Force Atlanta atlectf@einformation.usss.gov DataBreachServices@Intersections.com

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

State Data Breach Law Summary. November 2017

State Data Breach Law Summary. November 2017 November 2017 STATE DATA BREACH LAW SUMMARY To view the requirements for a specific state 1, click on the state name below. Alaska Idaho Minnesota Ohio Washington Arizona Illinois Mississippi Oklahoma

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

State Data Breach Notification Laws

State Data Breach Notification Laws State Data Breach Notification Laws This chart should be used for informational purposes only because the recommended actions an entity should take if it experiences a security event, incident, or breach

More information

SCHWARTZ & BALLEN LLP 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC

SCHWARTZ & BALLEN LLP 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC 20036-3465 WWW.SCHWARTZANDBALLEN.COM TELEPHONE FACSIMILE (202) 776-0700 (202) 776-0720 To Our Clients and Friends Re: State Security Breach Laws M E M O R A

More information

DATA BREACH CLAIMS IN THE US: An Overview of First Party Breach Requirements

DATA BREACH CLAIMS IN THE US: An Overview of First Party Breach Requirements State Governing Statutes 1st Party Breach Notification Notes Alabama No Law Alaska 45-48-10 Notification must be made "in the most expeditious time possible and without unreasonable delay" unless it will

More information

State Data Breach Notification Laws

State Data Breach Notification Laws State Data Breach Notification Laws This chart should be used for informational purposes only because the recommended actions an entity should take if it experiences a security event, incident, or breach

More information

State Data Breach Notification Laws

State Data Breach Notification Laws State Data Breach Notification Laws Please note that state data breach notification laws change frequently. The recommended actions an entity should take if it experiences a security event, incident or

More information

State Data Breach Laws

State Data Breach Laws State Data Breach Laws 1 Alaska Personal information means a combination of (A) an individual s name;... and (B) one or more of the following information elements: (i) the individual s social security

More information

STATE DATA SECURITY BREACH NOTIFICATION LAWS

STATE DATA SECURITY BREACH NOTIFICATION LAWS STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific

More information

Data Breach Charts. November 2017

Data Breach Charts. November 2017 Data Breach Charts November 2017 DATA BREACH CHARTS The following standard definitions of Personal Information and Breach of Security (based on the definition commonly used by most states) are used for

More information

STATE DATA SECURITY BREACH NOTIFICATION LAWS

STATE DATA SECURITY BREACH NOTIFICATION LAWS STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific

More information

Arent Fox LLP Survey of Data Breach Notification Statutes

Arent Fox LLP Survey of Data Breach Notification Statutes Arent Fox LLP Survey of Data Breach Notification Statutes James Westerlind August 2016 Survey Overview This Survey focuses on the data breach notification statutes of the states and territories within

More information

STATE DATA SECURITY BREACH NOTIFICATION LAWS

STATE DATA SECURITY BREACH NOTIFICATION LAWS STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific

More information

Arent Fox LLP Survey of Data Breach Notification Statutes

Arent Fox LLP Survey of Data Breach Notification Statutes Arent Fox LLP Survey of Data Breach Notification Statutes James Westerlind August 2017 Survey Overview This Survey focuses on the data breach notification statutes of the states and territories within

More information

Case 3:15-md CRB Document 4700 Filed 01/29/18 Page 1 of 5

Case 3:15-md CRB Document 4700 Filed 01/29/18 Page 1 of 5 Case 3:15-md-02672-CRB Document 4700 Filed 01/29/18 Page 1 of 5 Michele D. Ross Reed Smith LLP 1301 K Street NW Suite 1000 East Tower Washington, D.C. 20005 Telephone: 202 414-9297 Fax: 202 414-9299 Email:

More information

Laws Governing Data Security and Privacy U.S. Jurisdictions at a Glance UPDATED MARCH 30, 2015

Laws Governing Data Security and Privacy U.S. Jurisdictions at a Glance UPDATED MARCH 30, 2015 Laws Governing Data Security and Privacy U.S. Jurisdictions at a Glance UPDATED MARCH 30, 2015 State Statute Year Statute Alabama* Ala. Information Technology Policy 685-00 (Applicable to certain Executive

More information

The Victim Rights Law Center thanks Catherine Cambridge for her research assistance.

The Victim Rights Law Center thanks Catherine Cambridge for her research assistance. The Victim Rights Law Center thanks Catherine Cambridge for her research assistance. Privilege and Communication Between Professionals Summary of Research Findings Question Addressed: Which jurisdictions

More information

Laws Governing Data Security and Privacy U.S. Jurisdictions at a Glance

Laws Governing Data Security and Privacy U.S. Jurisdictions at a Glance Laws Governing Security and Privacy U.S. Jurisdictions at a Glance State Statute Year Statute Adopted or Significantly Revised Alabama* ALA. INFORMATION TECHNOLOGY POLICY 685-00 (applicable to certain

More information

ACTION: Notice announcing addresses for summons and complaints. SUMMARY: Our Office of the General Counsel (OGC) is responsible for processing

ACTION: Notice announcing addresses for summons and complaints. SUMMARY: Our Office of the General Counsel (OGC) is responsible for processing This document is scheduled to be published in the Federal Register on 02/23/2017 and available online at https://federalregister.gov/d/2017-03495, and on FDsys.gov 4191-02U SOCIAL SECURITY ADMINISTRATION

More information

Page 1 of 5. Appendix A.

Page 1 of 5. Appendix A. STATE Alabama Alaska Arizona Arkansas California Colorado Connecticut District of Columbia Delaware CONSUMER PROTECTION ACTS and PERSONAL INFORMATION PROTECTION ACTS Alabama Deceptive Trade Practices Act,

More information

PERMISSIBILITY OF ELECTRONIC VOTING IN THE UNITED STATES. Member Electronic Vote/ . Alabama No No Yes No. Alaska No No No No

PERMISSIBILITY OF ELECTRONIC VOTING IN THE UNITED STATES. Member Electronic Vote/  . Alabama No No Yes No. Alaska No No No No PERMISSIBILITY OF ELECTRONIC VOTING IN THE UNITED STATES State Member Conference Call Vote Member Electronic Vote/ Email Board of Directors Conference Call Vote Board of Directors Electronic Vote/ Email

More information

STATE DATA SECURITY BREACH LEGISLATION SURVEY

STATE DATA SECURITY BREACH LEGISLATION SURVEY STATE DATA SECURITY BREACH LEGISLATION SURVEY State and Timing/ Alaska H.B. 65 Signed into law June 13, 2008. Alaska Stat. Tit. 45, Ch. 48, 10 to 90 Alaska residents. Any person doing business, any person

More information

FEDERAL ELECTION COMMISSION [NOTICE ] Price Index Adjustments for Contribution and Expenditure Limitations and

FEDERAL ELECTION COMMISSION [NOTICE ] Price Index Adjustments for Contribution and Expenditure Limitations and This document is scheduled to be published in the Federal Register on 02/03/2015 and available online at http://federalregister.gov/a/2015-01963, and on FDsys.gov 6715-01-U FEDERAL ELECTION COMMISSION

More information

7-45. Electronic Access to Legislative Documents. Legislative Documents

7-45. Electronic Access to Legislative Documents. Legislative Documents Legislative Documents 7-45 Electronic Access to Legislative Documents Paper is no longer the only medium through which the public can gain access to legislative documents. State legislatures are using

More information

State P3 Legislation Matrix 1

State P3 Legislation Matrix 1 State P3 Legislation Matrix 1 Alabama Alaska Arizona Arkansas 2 Article 2: State Department of Ala. Code 23-1-40 Article 3: Public Roads, Bridges, and Ferries Ala. Code 23-1-80 to 23-1-95 Toll Road, Bridge

More information

State-by-State Chart of HIV-Specific Laws and Prosecutorial Tools

State-by-State Chart of HIV-Specific Laws and Prosecutorial Tools State-by-State Chart of -Specific s and Prosecutorial Tools 34 States, 2 Territories, and the Federal Government have -Specific Criminal s Last updated August 2017 -Specific Criminal? Each state or territory,

More information

Matthew Miller, Bureau of Legislative Research

Matthew Miller, Bureau of Legislative Research Matthew Miller, Bureau of Legislative Research Arkansas (reelection) Georgia (reelection) Idaho (reelection) Kentucky (reelection) Michigan (partisan nomination - reelection) Minnesota (reelection) Mississippi

More information

Rhoads Online State Appointment Rules Handy Guide

Rhoads Online State Appointment Rules Handy Guide Rhoads Online Appointment Rules Handy Guide ALABAMA Yes (15) DOI date approved 27-7-30 ALASKA Appointments not filed with DOI. Record producer appointment in SIC register within 30 days of effective date.

More information

THE PROCESS TO RENEW A JUDGMENT SHOULD BEGIN 6-8 MONTHS PRIOR TO THE DEADLINE

THE PROCESS TO RENEW A JUDGMENT SHOULD BEGIN 6-8 MONTHS PRIOR TO THE DEADLINE THE PROCESS TO RENEW A JUDGMENT SHOULD BEGIN 6-8 MONTHS PRIOR TO THE DEADLINE STATE RENEWAL Additional information ALABAMA Judgment good for 20 years if renewed ALASKA ARIZONA (foreign judgment 4 years)

More information

Electronic Notarization

Electronic Notarization Electronic Notarization Legal Disclaimer: Although a good faith attempt has been made to make this table as complete as possible, it is still subject to human error and constantly changing laws. It should

More information

2016 Voter Registration Deadlines by State

2016 Voter Registration Deadlines by State 2016 Voter s by Alabama 10/24/2016 https://www.alabamavotes.gov/electioninfo.aspx?m=vote rs Alaska 10/9/2016 (Election Day registration permitted for purpose of voting for president and Vice President

More information

2008 Changes to the Constitution of International Union UNITED STEELWORKERS

2008 Changes to the Constitution of International Union UNITED STEELWORKERS 2008 Changes to the Constitution of International Union UNITED STEELWORKERS MANUAL ADOPTED AT LAS VEGAS, NEVADA July 2008 Affix to inside front cover of your 2005 Constitution CONSTITUTIONAL CHANGES Constitution

More information

State Complaint Information

State Complaint Information State Complaint Information Each state expects the student to exhaust the University's grievance process before bringing the matter to the state. Complaints to states should be made only if the individual

More information

Chapter PERSONAL INFORMATION PROTECTION ACT. Article 01. BREACH OF SECURITY INVOLVING PERSONAL INFORMATION

Chapter PERSONAL INFORMATION PROTECTION ACT. Article 01. BREACH OF SECURITY INVOLVING PERSONAL INFORMATION Alaska Statute Chapter 45.48. PERSONAL INFORMATION PROTECTION ACT Article 01. BREACH OF SECURITY INVOLVING PERSONAL INFORMATION Sec. 45.48.010. Disclosure of breach of security. (a) If a covered person

More information

State Trial Courts with Incidental Appellate Jurisdiction, 2010

State Trial Courts with Incidental Appellate Jurisdiction, 2010 ALABAMA: G X X X de novo District, Probate, s ALASKA: ARIZONA: ARKANSAS: de novo or on the de novo (if no ) G O X X de novo CALIFORNIA: COLORADO: District Court, Justice of the Peace,, County, District,

More information

ACCESS TO STATE GOVERNMENT 1. Web Pages for State Laws, State Rules and State Departments of Health

ACCESS TO STATE GOVERNMENT 1. Web Pages for State Laws, State Rules and State Departments of Health 1 ACCESS TO STATE GOVERNMENT 1 Web Pages for State Laws, State Rules and State Departments of Health LAWS ALABAMA http://www.legislature.state.al.us/codeofalabama/1975/coatoc.htm RULES ALABAMA http://www.alabamaadministrativecode.state.al.us/alabama.html

More information

Elder Financial Abuse and State Mandatory Reporting Laws for Financial Institutions Prepared by CUNA s State Government Affairs

Elder Financial Abuse and State Mandatory Reporting Laws for Financial Institutions Prepared by CUNA s State Government Affairs Elder Financial Abuse and State Mandatory Reporting Laws for Financial Institutions Prepared by CUNA s State Government Affairs Overview Financial crimes and exploitation can involve the illegal or improper

More information

Survey of State Laws on Credit Unions Incidental Powers

Survey of State Laws on Credit Unions Incidental Powers Survey of State Laws on Credit Unions Incidental Powers Alabama Ala. Code 5-17-4(10) To exercise incidental powers as necessary to enable it to carry on effectively the purposes for which it is incorporated

More information

UNIFORM NOTICE OF REGULATION A TIER 2 OFFERING Pursuant to Section 18(b)(3), (b)(4), and/or (c)(2) of the Securities Act of 1933

UNIFORM NOTICE OF REGULATION A TIER 2 OFFERING Pursuant to Section 18(b)(3), (b)(4), and/or (c)(2) of the Securities Act of 1933 Item 1. Issuer s Identity UNIFORM NOTICE OF REGULATION A TIER 2 OFFERING Pursuant to Section 18(b)(3), (b)(4), and/or (c)(2) of the Securities Act of 1933 Name of Issuer Previous Name(s) None Entity Type

More information

National State Law Survey: Statute of Limitations 1

National State Law Survey: Statute of Limitations 1 National State Law Survey: Limitations 1 Alabama Alaska Arizona Arkansas California Colorado Connecticut Delaware DC Florida Georgia Hawaii limitations Trafficking and CSEC within 3 limit for sex trafficking,

More information

8. Public Information

8. Public Information 8. Public Information Communicating with Legislators ackground. A very important component of the legislative process is citizen participation. One of the greatest responsibilities of state residents is

More information

NOTICE TO MEMBERS No January 2, 2018

NOTICE TO MEMBERS No January 2, 2018 NOTICE TO MEMBERS No. 2018-004 January 2, 2018 Trading by U.S. Residents Canadian Derivatives Clearing Corporation (CDCC) maintains registrations with various U.S. state securities regulatory authorities

More information

Delegates: Understanding the numbers and the rules

Delegates: Understanding the numbers and the rules Delegates: Understanding the numbers and the rules About 4,051 pledged About 712 unpledged 2472 delegates Images from: https://ballotpedia.org/presidential_election,_2016 On the news I hear about super

More information

MEMORANDUM JUDGES SERVING AS ARBITRATORS AND MEDIATORS

MEMORANDUM JUDGES SERVING AS ARBITRATORS AND MEDIATORS Knowledge Management Office MEMORANDUM Re: Ref. No.: By: Date: Regulation of Retired Judges Serving as Arbitrators and Mediators IS 98.0561 Jerry Nagle, Colleen Danos, and Anne Endress Skove October 22,

More information

ARTICLE I ESTABLISHMENT NAME

ARTICLE I ESTABLISHMENT NAME National Association of State Mental Health Program Directors (NASMHPD) Older Persons Division (OPD) By-Laws Last revised: May 7, 2014 66 Canal Center Plaza, Suite 302, Alexandria, Virginia 22314 Ph: (703)

More information

STATE LAWS SUMMARY: CHILD LABOR CERTIFICATION REQUIREMENTS BY STATE

STATE LAWS SUMMARY: CHILD LABOR CERTIFICATION REQUIREMENTS BY STATE STATE LAWS SUMMARY: CHILD LABOR CERTIFICATION REQUIREMENTS BY STATE THE PROBLEM: Federal child labor laws limit the kinds of work for which kids under age 18 can be employed. But as with OSHA, federal

More information

Survey of State Civil Shoplifting Statutes

Survey of State Civil Shoplifting Statutes University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln College of Law, Faculty Publications Law, College of 2015 Survey of State Civil Shoplifting Statutes Ryan Sullivan University

More information

Committee Consideration of Bills

Committee Consideration of Bills Committee Procedures 4-79 Committee Consideration of ills It is not possible for all legislative business to be conducted by the full membership; some division of labor is essential. Legislative committees

More information

Campaign Finance E-Filing Systems by State WHAT IS REQUIRED? WHO MUST E-FILE? Candidates (Annually, Monthly, Weekly, Daily).

Campaign Finance E-Filing Systems by State WHAT IS REQUIRED? WHO MUST E-FILE? Candidates (Annually, Monthly, Weekly, Daily). Exhibit E.1 Alabama Alabama Secretary of State Mandatory Candidates (Annually, Monthly, Weekly, Daily). PAC (annually), Debts. A filing threshold of $1,000 for all candidates for office, from statewide

More information

STATUS OF 2002 REED ACT DISTRIBUTION BY STATE

STATUS OF 2002 REED ACT DISTRIBUTION BY STATE STATUS OF 2002 REED ACT DISTRIBUTION BY STATE Revised January 2003 State State Reed Act Reed Act Funds Appropriated* (as of November 2002) Comments on State s Reed Act Activity Alabama $110,623,477 $16,650,000

More information

Name Change Laws. Current as of February 23, 2017

Name Change Laws. Current as of February 23, 2017 Name Change Laws Current as of February 23, 2017 MAP relies on the research conducted by the National Center for Transgender Equality for this map and the statutes found below. Alabama An applicant must

More information

If you have questions, please or call

If you have questions, please  or call SCCE's 17th Annual Compliance & Ethics Institute: CLE Approvals By State The SCCE submitted sessions deemed eligible for general CLE credits and legal ethics CLE credits to most states with CLE requirements

More information

Limitations on Contributions to Political Committees

Limitations on Contributions to Political Committees Limitations on Contributions to Committees Term for PAC Individual PAC Corporate/Union PAC Party PAC PAC PAC Transfers Alabama 10-2A-70.2 $500/election Alaska 15.13.070 Group $500/year Only 10% of a PAC's

More information

Accountability-Sanctions

Accountability-Sanctions Accountability-Sanctions Education Commission of the States 700 Broadway, Suite 801 Denver, CO 80203-3460 303.299.3600 Fax: 303.296.8332 www.ecs.org Student Accountability Initiatives By Michael Colasanti

More information

State Statutory Provisions Addressing Mutual Protection Orders

State Statutory Provisions Addressing Mutual Protection Orders State Statutory Provisions Addressing Mutual Protection Orders Revised 2014 National Center on Protection Orders and Full Faith & Credit 1901 North Fort Myer Drive, Suite 1011 Arlington, Virginia 22209

More information

Do you consider FEIN's to be public or private information? Do you consider phone numbers to be private information?

Do you consider FEIN's to be public or private information? Do you consider phone numbers to be private information? Topic: Question by: : Private vs. Public Information Penney Barker West Virginia Date: 18 April 2011 Manitoba Corporations Canada Alabama Corporations Canada is responsible for incorporating businesses

More information

Intro/Background/Disclaimers Goals/Objectives Perspective: to give you an idea how fast the law is changing in these areas, you need look no further

Intro/Background/Disclaimers Goals/Objectives Perspective: to give you an idea how fast the law is changing in these areas, you need look no further Intro/Background/Disclaimers Goals/Objectives Perspective: to give you an idea how fast the law is changing in these areas, you need look no further than the state of New Mexico. New Mexico joined 47 other

More information

Floor Amendment Procedures

Floor Amendment Procedures Floor Action 5-179 Floor Amendment Procedures ills are introduced, but very few are enacted in the same form in which they began. ills are refined as they move through the legislative process. Committees

More information

Section 4. Table of State Court Authorities Governing Judicial Adjuncts and Comparison Between State Rules and Fed. R. Civ. P. 53

Section 4. Table of State Court Authorities Governing Judicial Adjuncts and Comparison Between State Rules and Fed. R. Civ. P. 53 Section 4. Table of State Court Authorities Governing Judicial Adjuncts and Comparison Between State Rules and Fed. R. Civ. P. 53 This chart originally appeared in Lynn Jokela & David F. Herr, Special

More information

Statutes of Limitations for the 50 States (and the District of Columbia)

Statutes of Limitations for the 50 States (and the District of Columbia) s of Limitations in All 50 s Nolo.com Page 6 of 14 Updated September 18, 2015 The chart below contains common statutes of limitations for all 50 states, expressed in years. We provide this chart as a rough

More information

Notice N HCFB-1. March 25, Subject: FEDERAL-AID HIGHWAY PROGRAM OBLIGATION AUTHORITY FISCAL YEAR (FY) Classification Code

Notice N HCFB-1. March 25, Subject: FEDERAL-AID HIGHWAY PROGRAM OBLIGATION AUTHORITY FISCAL YEAR (FY) Classification Code Notice Subject: FEDERAL-AID HIGHWAY PROGRAM OBLIGATION AUTHORITY FISCAL YEAR (FY) 2009 Classification Code N 4520.201 Date March 25, 2009 Office of Primary Interest HCFB-1 1. What is the purpose of this

More information

CA CALIFORNIA. Ala. Code 10-2B (2009) [Transferred, effective January 1, 2011, to 10A ] No monetary penalties listed.

CA CALIFORNIA. Ala. Code 10-2B (2009) [Transferred, effective January 1, 2011, to 10A ] No monetary penalties listed. AL ALABAMA Ala. Code 10-2B-15.02 (2009) [Transferred, effective January 1, 2011, to 10A-2-15.02.] No monetary penalties listed. May invalidate in-state contracts made by unqualified foreign corporations.

More information

POLITICAL CONTRIBUTIONS. OUT-OF- STATE DONORS. INITIATIVE STATUTE.

POLITICAL CONTRIBUTIONS. OUT-OF- STATE DONORS. INITIATIVE STATUTE. University of California, Hastings College of the Law UC Hastings Scholarship Repository Initiatives California Ballot Propositions and Initiatives 3-13-2015 POLITICAL CONTRIBUTIONS. OUT-OF- STATE DONORS.

More information

Democratic Convention *Saturday 1 March 2008 *Monday 25 August - Thursday 28 August District of Columbia Non-binding Primary

Democratic Convention *Saturday 1 March 2008 *Monday 25 August - Thursday 28 August District of Columbia Non-binding Primary Presidential Primaries, Caucuses, and s Chronologically http://www.thegreenpapers.com/p08/events.phtml?s=c 1 of 9 5/29/2007 2:23 PM Presidential Primaries, Caucuses, and s Chronologically Disclaimer: These

More information

Official Voter Information for General Election Statute Titles

Official Voter Information for General Election Statute Titles Official Voter Information for General Election Statute Titles Alabama 17-6-46. Voting instruction posters. Alaska Sec. 15.15.070. Public notice of election required Sec. 15.58.010. Election pamphlet Sec.

More information

WORLD TRADE ORGANIZATION

WORLD TRADE ORGANIZATION Page D-1 ANNEX D REQUEST FOR THE ESTABLISHMENT OF A PANEL BY ANTIGUA AND BARBUDA WORLD TRADE ORGANIZATION WT/DS285/2 13 June 2003 (03-3174) Original: English UNITED STATES MEASURES AFFECTING THE CROSS-BORDER

More information

Issue Brief. A Public Policy Paper of the National Association of Mutual Insurance Companies July 2005

Issue Brief. A Public Policy Paper of the National Association of Mutual Insurance Companies July 2005 A Public Policy Paper of the National Association of Mutual Insurance Companies July 2005 By David B. Reddick State Affairs Manager Southeast Region Executive Summary State legislators have moved quickly

More information

States Adopt Emancipation Day Deadline for Individual Returns; Some Opt Against Allowing Delay for Corporate Returns in 2012

States Adopt Emancipation Day Deadline for Individual Returns; Some Opt Against Allowing Delay for Corporate Returns in 2012 Source: Weekly State Tax Report: News Archive > 2012 > 03/16/2012 > Perspective > States Adopt Deadline for Individual Returns; Some Opt Against Allowing Delay for Corporate Returns in 2012 2012 TM-WSTR

More information

PROFESSIONAL STANDARDS POLICY. Table of Contents Page

PROFESSIONAL STANDARDS POLICY. Table of Contents Page PROFESSIONAL STANDARDS POLICY Title: REGIONAL COORDINATOR ROLES AND RESPONSIBILITIES Doc ID: PS6008 Revision: 0.09 Committee: Professional Standards Written by: C. Wilson, R. Anderson, J. Smith Date Established:

More information

INSTITUTE of PUBLIC POLICY

INSTITUTE of PUBLIC POLICY INSTITUTE of PUBLIC POLICY Harry S Truman School of Public Affairs University of Missouri ANALYSIS OF STATE REVENUES AND EXPENDITURES Andrew Wesemann and Brian Dabson Summary This report analyzes state

More information

State By State Survey:

State By State Survey: Connecticut California Florida State By State Survey: Cyber Risk - Security Breach tification s The Right Choice for Policyholders www.sdvlaw.com Cyber Risk 2 Cyber Risk - Security Breach tification s

More information

WYOMING POPULATION DECLINED SLIGHTLY

WYOMING POPULATION DECLINED SLIGHTLY FOR IMMEDIATE RELEASE Wednesday, December 19, 2018 Contact: Dr. Wenlin Liu, Chief Economist WYOMING POPULATION DECLINED SLIGHTLY CHEYENNE -- Wyoming s total resident population contracted to 577,737 in

More information

ASSOCIATES OF VIETNAM VETERANS OF AMERICA, INC. BYLAWS (A Nonprofit Corporation)

ASSOCIATES OF VIETNAM VETERANS OF AMERICA, INC. BYLAWS (A Nonprofit Corporation) Article I Name The name of the corporation is Associates of Vietnam Veterans of America, Inc., as prescribed by the Articles of Incorporation, hereinafter referred to as the Corporation. Article II Purposes

More information

12B,C: Voting Power and Apportionment

12B,C: Voting Power and Apportionment 12B,C: Voting Power and Apportionment Group Activities 12C Apportionment 1. A college offers tutoring in Math, English, Chemistry, and Biology. The number of students enrolled in each subject is listed

More information

2018 Constituent Society Delegate Apportionment

2018 Constituent Society Delegate Apportionment Memo to: From: Executive Directors State Medical Associations James L. Madara, MD Date: February 1, Subject: Constituent Society Apportionment I am pleased to provide delegate apportionment figures for.

More information

Soybean Promotion and Research: Amend the Order to Adjust Representation on the United Soybean Board

Soybean Promotion and Research: Amend the Order to Adjust Representation on the United Soybean Board This document is scheduled to be published in the Federal Register on 07/06/08 and available online at https://federalregister.gov/d/08-507, and on FDsys.gov DEPARTMENT OF AGRICULTURE Agricultural Marketing

More information

ADVANCEMENT, JURISDICTION-BY-JURISDICTION

ADVANCEMENT, JURISDICTION-BY-JURISDICTION , JURISDICTION-B-JURISDICTION Jurisdictions that make advancement statutorily mandatory subject to opt-out or limitation. EXPRESSL MANDATOR 1 Minnesota 302A. 521, Subd. 3 North Dakota 10-19.1-91 4. Ohio

More information

Appendix 6 Right of Publicity

Appendix 6 Right of Publicity Last Updated: July 2016 Appendix 6 Right of Publicity Common-Law State Statute Rights Survives Death Alabama Yes Yes 55 Years After Death (only applies to soldiers and survives soldier s death) Alaska

More information

Intake 1 Total Requests Received 4

Intake 1 Total Requests Received 4 Fiscal Year - Total Period Requests Accepted 2 Requests Rejected 3 Number of Form I-821D,Consideration of Deferred Action for Childhood Arrivals, by Fiscal Year, Quarter, Intake and Case Status Fiscal

More information

0 Smithsonian Institution

0 Smithsonian Institution 0 Smithsonian Institution Date: January 2, 2019 From: Subject: Brenda Malone Director, Office of Human Resources Furlough Decision Notice In the absence of either a Fiscal Year (FY) 2019 appropriation,

More information

Mrs. Yuen s Final Exam. Study Packet. your Final Exam will be held on. Part 1: Fifty States and Capitals (100 points)

Mrs. Yuen s Final Exam. Study Packet. your Final Exam will be held on. Part 1: Fifty States and Capitals (100 points) Mrs. Yuen s Final Exam Study Packet your Final Exam will be held on All make up assignments must be turned in by YOUR finals day!!!! Part 1: Fifty States and Capitals (100 points) Be able to identify the

More information

28 USC 152. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

28 USC 152. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see TITLE 28 - JUDICIARY AND JUDICIAL PROCEDURE PART I - ORGANIZATION OF COURTS CHAPTER 6 - BANKRUPTCY JUDGES 152. Appointment of bankruptcy judges (a) (1) Each bankruptcy judge to be appointed for a judicial

More information

BYLAWS. Mission Providing visionary leadership in nursing education to improve the health and wellbeing of our communities.

BYLAWS. Mission Providing visionary leadership in nursing education to improve the health and wellbeing of our communities. BYLAWS Article I Name This organization shall be known as the Organization for Associate Degree Nursing (OADN). The name of the organization shall officially be abbreviated as OADN. Article II Vision and

More information

APPENDIX D STATE PERPETUITIES STATUTES

APPENDIX D STATE PERPETUITIES STATUTES APPENDIX D STATE PERPETUITIES STATUTES 218 STATE PERPETUITIES STATUTES State Citation PERMITS PERPETUAL TRUSTS Alaska Alaska Stat. 34.27.051, 34.27.100 Delaware 25 Del. C. 503 District of Columbia D.C.

More information

Intake 1 Total Requests Received 4

Intake 1 Total Requests Received 4 Fiscal Year - Total Period Requests Accepted 2 Requests Rejected 3 Number of Form I-821D,Consideration of Deferred Action for Childhood Arrivals, by Fiscal Year, Quarter, Intake and Case Status Fiscal

More information

Governance State Boards/Chiefs/Agencies

Governance State Boards/Chiefs/Agencies Governance State Boards/Chiefs/Agencies Education Commission of the States 700 Broadway, Suite 1200 Denver, CO 80203-3460 303.299.3600 Fax: 303.296.8332 www.ecs.org Qualifications for Chief State School

More information

TELEPHONE; STATISTICAL INFORMATION; PRISONS AND PRISONERS; LITIGATION; CORRECTIONS; DEPARTMENT OF CORRECTION ISSUES

TELEPHONE; STATISTICAL INFORMATION; PRISONS AND PRISONERS; LITIGATION; CORRECTIONS; DEPARTMENT OF CORRECTION ISSUES TELEPHONE; STATISTICAL INFORMATION; PRISONS AND PRISONERS; LITIGATION; CORRECTIONS; PRISONS AND PRISONERS; June 26, 2003 DEPARTMENT OF CORRECTION ISSUES 2003-R-0469 By: Kevin E. McCarthy, Principal Analyst

More information

SUMMARY: Pursuant to the Privacy Act of 1974, as amended, and the Office of Management

SUMMARY: Pursuant to the Privacy Act of 1974, as amended, and the Office of Management DEPARTMENT OF THE TREASURY Internal Revenue Service Privacy Act of 1974 AGENCY: Internal Revenue Service, Treasury. ACTION: Notice of a New Matching Program. SUMMARY: Pursuant to the Privacy Act of 1974,

More information

COMPLYING WITH U.S. STATE AND TERRITORIAL SECURITY BREACH NOTIFICATION LAWS

COMPLYING WITH U.S. STATE AND TERRITORIAL SECURITY BREACH NOTIFICATION LAWS COMPLYING WITH U.S. STATE AND TERRITORIAL SECURITY BREACH NOTIFICATION LAWS Excerpted from Chapter 27 (Internet, Network and Data Security) of E-Commerce and Internet Law: A Legal Treatise With Forms,

More information

Chart 12.7: State Appellate Court Divisions (Cross-reference ALWD Rule 12.6(b)(2))

Chart 12.7: State Appellate Court Divisions (Cross-reference ALWD Rule 12.6(b)(2)) Chart 12.7: State Appellate Court (Cross-reference ALWD Rule 12.6(b)(2)) Alabama Divided Court of Civil Appeals Court of Criminal Appeals Alaska Not applicable Not applicable Arizona Divided** Court of

More information

APPENDIX C STATE UNIFORM TRUST CODE STATUTES

APPENDIX C STATE UNIFORM TRUST CODE STATUTES APPENDIX C STATE UNIFORM TRUST CODE STATUTES 122 STATE STATE UNIFORM TRUST CODE STATUTES CITATION Alabama Ala. Code 19-3B-101 19-3B-1305 Arkansas Ark. Code Ann. 28-73-101 28-73-1106 District of Columbia

More information

Fiscal Year (September 30, 2018) Requests by Intake and Case Status Intake 1 Case Review 6 Period

Fiscal Year (September 30, 2018) Requests by Intake and Case Status Intake 1 Case Review 6 Period Number of Form I 821D,Consideration of Deferred Action for Childhood Arrivals, by Fiscal Year, Quarter, Intake and Case Status Fiscal Year 2012 2018 (September 30, 2018) Requests by Intake and Case Status

More information

Eligibility for Membership. Membership shall be open to individuals and agencies interested in the goals and objectives of the Organization.

Eligibility for Membership. Membership shall be open to individuals and agencies interested in the goals and objectives of the Organization. BYLAWS REVISED 08/22/2018 Article I Name This organization shall be known as the Organization for Associate Degree Nursing (OADN). The name of the organization shall officially be abbreviated as OADN.

More information

National Latino Peace Officers Association

National Latino Peace Officers Association National Latino Peace Officers Association Bylaws & SOP Changes: Vote for ADD STANDARD X Posting on Facebook, Instagram, text message and etc.. shall be in compliance to STANDARD II - MISSION NATIONAL

More information

American Government. Workbook

American Government. Workbook American Government Workbook WALCH PUBLISHING Table of Contents To the Student............................. vii Unit 1: What Is Government? Activity 1 Monarchs of Europe...................... 1 Activity

More information

The remaining legislative bodies have guides that help determine bill assignments. Table shows the criteria used to refer bills.

The remaining legislative bodies have guides that help determine bill assignments. Table shows the criteria used to refer bills. ills and ill Processing 3-17 Referral of ills The first major step in the legislative process is to introduce a bill; the second is to have it heard by a committee. ut how does legislation get from one

More information